[1] |
Khan I,Belqasmi F,Glitho R,et al.Wireless sensor network virtualization:A survey[J].IEEE Communications Surveys & Tutorials,2015,18(1):553-576.
|
[2] |
Wang Y C,Chen K C.Efficient path planning for a mobile sink to reliably gather data from sensors with diverse sensing rates and limited buffers[J].IEEE Transactions on Mobile Computing,2018,18(7):1527-1540.
|
[3] |
Xu W,Liang W,Jia X,et al.Maximizing sensor lifetime with the minimal service cost of a mobile charger in wireless sensor networks[J].IEEE Transactions on Mobile Computing,2018,17(11):2564-2577.
|
[4] |
Ren J,Zhang Y,Zhang K,et al.Lifetime and energy hole evolution analysis in data-gathering wireless sensor networks[J].IEEE Transactions on Industrial Informatics,2015,12(2):788-800.
|
[5] |
Wu Q,Zhang R.Common throughput maximization in UAV-enabled OFDMA systems with delay consideration[J].IEEE Transactions on Communications,2018,66(12):6614-6627.
|
[6] |
Li R,Wei Z,Yang L,et al.Resource allocation for secure multi-UAV communication systems with multi-eavesdropper[J].IEEE Transactions on Communications,2020,68(7):4490-4506.
|
[7] |
Zhou X,Wu Q,Yan S,et al.UAV-enabled secure communications:Joint trajectory and transmit power optimization[J].IEEE Transactions on Vehicular Technology,2019,68(4):4069-4073.
|
[8] |
Wyner A D.The wire-tap channel[J].Bell System Technical Journal,1975,54(8):1355-1387.
|
[9] |
Gopala P K,Lai L,Ei G H.On the secrecy capacity of fading channels[J].IEEE Transactions on Information Theory,2008,54(10):4687-4698.
|
[10] |
Liang Y,Poor H V,Shamai S.Secure communication over fading channels[J].IEEE Transactions on Information Theory,2008,54(6):2470-2492.
|
[11] |
Wang X,Tao M,Mo J,et al.Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks[J].IEEE Transactions on Information Forensics and Security,2011,6(3):693-702.
|
[12] |
Zhang G,Wu Q,Cui M,et al.Securing UAV communications via joint trajectory and power control[J].IEEE Tran- sactions on Wireless Communications,2019,18(2):1376-1389.
|
[13] |
Xiao L,Xu Y,Yang D,et al.Secrecy energy efficiency maximization for UAV-enabled mobile relaying[J].IEEE Tran- sactions on Green Communications and Networking,2019,4(1):180-193.
|
[14] |
Li A,Wu Q,Zhang R.UAV-enabled cooperative jamming for improving secrecy of ground wiretap channel[J].IEEE Wireless Communications Letters,2018,8(1):181-184.
|
[15] |
Zhong C,Yao J,Xu J.Secure UAV communication with cooperative jamming and trajectory control[J].IEEE Communications Letters,2018,23(2):286-289.
|
[16] |
Cui M,Zhang G,Wu Q,et al.Robust trajectory and transmit power design for secure UAV communications[J].IEEE Transactions on Vehicular Technology,2018,67(9):9042-9046.
|
[17] |
Li Y,Zhang R,Zhang J,et al.Cooperative jamming for secure UAV communications with partial eavesdropper information[J].IEEE Access,2019,7:94593-94603.
|
[18] |
Cai Y,Wei Z,Li R,et al.Energy-efficient resource allocation for secure UAV communication systems[C]∥Proc of IEEE Wireless Communications and Networking Conference,2019:1-8.
|
[19] |
Hu J,Cai X,Yang K.Joint trajectory and scheduling design for UAV aided secure backscatter communications[J].IEEE Wireless Communications Letters,2020,9(12):2168-2172.
|
[20] |
Fan W,Wu Y,Ju S,et al.Secure UAV communication with robust communication and trajectory design[C]∥Proc of International Conference on Computer,Information and Telecommunication Systems,2019:1-5.
|
[21] |
Lee H,Eom S,Park J,et al.UAV-aided secure communications with cooperative jamming[J].IEEE Transactions on Vehicular Technology,2018,67(10):9385-9392.
|
[22] |
Hua M,Wang Y,Wu Q,et al.Energy-efficient cooperative secure transmission in multi-UAV-enabled wireless networks[J].IEEE Transactions on Vehicular Technology,2019,68(8):7761-7775.
|
[23] |
Li R,Wei Z,Yang L,et al.Resource allocation for secure multi-UAV communication systems with multi-eavesdropper[J].IEEE Transactions on Communications,2020,68(7):4490-4506.
|
[24] |
Zhan C,Zeng Y,Zhang R.Energy-efficient data collection in UAV enabled wireless sensor network[J].IEEE Wireless Communications Letters,2017,7(3):328-331.
|
[25] |
Gong J,Chang T H,Shen C,et al.Flight time minimization of UAV for data collection over wireless sensor networks[J].IEEE Journal on Selected Areas in Communications,2018,36(9):1942-1954.
|
[26] |
Zhan C, Zeng Y.Completion time minimization for multi-UAV-enabled data collection[J].IEEE Transactions on Wireless Communications,2019,18(10):4859-4872.
|
[27] |
Lin X,Yajnanarayana V,Muruganathan S D,et al.The sky is not the limit:LTE for unmanned aerial vehicles[J].IEEE Communications Magazine,2018,56(4):204-210.
|
[28] |
Zhang G,Xu J,Wu Q,et al.Wireless powered cooperative jamming for secure OFDM system[J].IEEE Transactions on Vehicular Technology,2017,67(2):1331-1346.
|
[29] |
Boyd S, Boyd S P,Vandenberghe L.Convex optimization[M].Cambridge:Cambridge University Press,2004.
|
[30] |
Du D Z,Ko K I,Hu X.Design and analysis of approximation algorithms[M].Richardson:University of Texas at Dallas Press,2012.
|
[31] |
Wu Q,Zeng Y,Zhang R.Joint trajectory and communication design for multi-UAV enabled wireless networks[J].IEEE Transactions on Wireless Communications,2018,17(3):2109-2121.
|